Skip to content

Commit bf4b0f0

Browse files
authored
Merge pull request zalando#240 from zalando-incubator/feature/goreport-improvements
Some improvements for golint, ineffassign and misspell
2 parents cca73e3 + 8801e62 commit bf4b0f0

File tree

8 files changed

+31
-36
lines changed

8 files changed

+31
-36
lines changed

pkg/apiserver/apiserver.go

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -164,26 +164,23 @@ func (s *Server) clusters(w http.ResponseWriter, req *http.Request) {
164164
clusterNames = append(clusterNames, cluster.Name[len(matches["team"])+1:])
165165
}
166166

167-
s.respond(clusterNames, nil, w)
168-
return
167+
resp, err = clusterNames, nil
169168
} else if matches := util.FindNamedStringSubmatch(clusterLogsURL, req.URL.Path); matches != nil {
170169
namespace, _ := matches["namespace"]
171170
resp, err = s.controller.ClusterLogs(matches["team"], namespace, matches["cluster"])
172171
} else if matches := util.FindNamedStringSubmatch(clusterHistoryURL, req.URL.Path); matches != nil {
173172
namespace, _ := matches["namespace"]
174173
resp, err = s.controller.ClusterHistory(matches["team"], namespace, matches["cluster"])
175174
} else if req.URL.Path == clustersURL {
176-
res := make(map[string][]string)
175+
clusterNamesPerTeam := make(map[string][]string)
177176
for team, clusters := range s.controller.TeamClusterList() {
178177
for _, cluster := range clusters {
179-
res[team] = append(res[team], cluster.Name[len(team)+1:])
178+
clusterNamesPerTeam[team] = append(clusterNamesPerTeam[team], cluster.Name[len(team)+1:])
180179
}
181180
}
182-
183-
s.respond(res, nil, w)
184-
return
181+
resp, err = clusterNamesPerTeam, nil
185182
} else {
186-
err = fmt.Errorf("page not found")
183+
resp, err = nil, fmt.Errorf("page not found")
187184
}
188185

189186
s.respond(resp, err, w)

pkg/cluster/k8sres.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -275,9 +275,9 @@ func (c *Cluster) tolerations(tolerationsSpec *[]v1.Toleration) []v1.Toleration
275275
Effect: v1.TaintEffect(podToleration["effect"]),
276276
},
277277
}
278-
} else {
279-
return []v1.Toleration{}
280278
}
279+
280+
return []v1.Toleration{}
281281
}
282282

283283
func (c *Cluster) generatePodTemplate(
@@ -376,7 +376,7 @@ func (c *Cluster) generatePodTemplate(
376376
var names []string
377377
// handle environment variables from the PodEnvironmentConfigMap. We don't use envSource here as it is impossible
378378
// to track any changes to the object envSource points to. In order to emulate the envSource behavior, however, we
379-
// need to make sure that PodConfigMap variables doesn't override those we set explicitely from the configuration
379+
// need to make sure that PodConfigMap variables doesn't override those we set explicitly from the configuration
380380
// parameters
381381
envVarsMap := make(map[string]string)
382382
for _, envVar := range envVars {

pkg/cluster/pg.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ func (c *Cluster) getDatabases() (map[string]string, error) {
180180
dbs[datname] = owner
181181
}
182182

183-
return dbs, nil
183+
return dbs, err
184184
}
185185

186186
// executeCreateDatabase creates new database with the given owner.

pkg/cluster/resources.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -419,9 +419,8 @@ func (c *Cluster) deletePodDisruptionBudget() error {
419419
}
420420
if k8sutil.ResourceNotFound(err2) {
421421
return true, nil
422-
} else {
423-
return false, err2
424422
}
423+
return false, err2
425424
})
426425
if err != nil {
427426
return fmt.Errorf("could not delete pod disruption budget: %v", err)

pkg/cluster/util.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ type OAuthTokenGetter interface {
2828
getOAuthToken() (string, error)
2929
}
3030

31-
// OAuthTokenGetter enables fetching OAuth tokens by reading Kubernetes secrets
31+
// SecretOauthTokenGetter enables fetching OAuth tokens by reading Kubernetes secrets
3232
type SecretOauthTokenGetter struct {
3333
kubeClient *k8sutil.KubernetesClient
3434
OAuthTokenSecretName spec.NamespacedName

pkg/util/retryutil/retry_util.go

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,14 @@ import (
55
"time"
66
)
77

8+
// RetryTicker is a wrapper aroung time.Tick,
9+
// that allows to mock its implementation
810
type RetryTicker interface {
911
Stop()
1012
Tick()
1113
}
1214

15+
// Ticker is a real implementation of RetryTicker interface
1316
type Ticker struct {
1417
ticker *time.Ticker
1518
}
@@ -18,10 +21,7 @@ func (t *Ticker) Stop() { t.ticker.Stop() }
1821

1922
func (t *Ticker) Tick() { <-t.ticker.C }
2023

21-
// Retry calls ConditionFunc until either:
22-
// * it returns boolean true
23-
// * a timeout expires
24-
// * an error occurs
24+
// Retry is a wrapper around RetryWorker that provides a real RetryTicker
2525
func Retry(interval time.Duration, timeout time.Duration, f func() (bool, error)) error {
2626
//TODO: make the retry exponential
2727
if timeout < interval {
@@ -31,6 +31,10 @@ func Retry(interval time.Duration, timeout time.Duration, f func() (bool, error)
3131
return RetryWorker(interval, timeout, tick, f)
3232
}
3333

34+
// RetryWorker calls ConditionFunc until either:
35+
// * it returns boolean true
36+
// * a timeout expires
37+
// * an error occurs
3438
func RetryWorker(
3539
interval time.Duration,
3640
timeout time.Duration,

pkg/util/retryutil/retry_util_test.go

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ type mockTicker struct {
1313
func (t *mockTicker) Stop() {}
1414

1515
func (t *mockTicker) Tick() {
16-
t.counter += 1
16+
t.counter++
1717
}
1818

1919
func TestRetryWorkerSuccess(t *testing.T) {
@@ -36,13 +36,8 @@ func TestRetryWorkerOneFalse(t *testing.T) {
3636

3737
tick := &mockTicker{t, 0}
3838
result := RetryWorker(1, 3, tick, func() (bool, error) {
39-
counter += 1
40-
41-
if counter <= 1 {
42-
return false, nil
43-
} else {
44-
return true, nil
45-
}
39+
counter++
40+
return counter > 1, nil
4641
})
4742

4843
if result != nil {

pkg/util/users/users.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ type DefaultUserSyncStrategy struct {
2929
}
3030

3131
// ProduceSyncRequests figures out the types of changes that need to happen with the given users.
32-
func (s DefaultUserSyncStrategy) ProduceSyncRequests(dbUsers spec.PgUserMap,
32+
func (strategy DefaultUserSyncStrategy) ProduceSyncRequests(dbUsers spec.PgUserMap,
3333
newUsers spec.PgUserMap) (reqs []spec.PgSyncUserRequest) {
3434

3535
// No existing roles are deleted or stripped of role memebership/flags
@@ -70,19 +70,19 @@ func (s DefaultUserSyncStrategy) ProduceSyncRequests(dbUsers spec.PgUserMap,
7070
}
7171

7272
// ExecuteSyncRequests makes actual database changes from the requests passed in its arguments.
73-
func (s DefaultUserSyncStrategy) ExecuteSyncRequests(reqs []spec.PgSyncUserRequest, db *sql.DB) error {
73+
func (strategy DefaultUserSyncStrategy) ExecuteSyncRequests(reqs []spec.PgSyncUserRequest, db *sql.DB) error {
7474
for _, r := range reqs {
7575
switch r.Kind {
7676
case spec.PGSyncUserAdd:
77-
if err := s.createPgUser(r.User, db); err != nil {
77+
if err := strategy.createPgUser(r.User, db); err != nil {
7878
return fmt.Errorf("could not create user %q: %v", r.User.Name, err)
7979
}
8080
case spec.PGsyncUserAlter:
81-
if err := s.alterPgUser(r.User, db); err != nil {
81+
if err := strategy.alterPgUser(r.User, db); err != nil {
8282
return fmt.Errorf("could not alter user %q: %v", r.User.Name, err)
8383
}
8484
case spec.PGSyncAlterSet:
85-
if err := s.alterPgUserSet(r.User, db); err != nil {
85+
if err := strategy.alterPgUserSet(r.User, db); err != nil {
8686
return fmt.Errorf("could not set custom user %q parameters: %v", r.User.Name, err)
8787
}
8888
default:
@@ -102,7 +102,7 @@ func (strategy DefaultUserSyncStrategy) alterPgUserSet(user spec.PgUser, db *sql
102102
return
103103
}
104104

105-
func (s DefaultUserSyncStrategy) createPgUser(user spec.PgUser, db *sql.DB) (err error) {
105+
func (strategy DefaultUserSyncStrategy) createPgUser(user spec.PgUser, db *sql.DB) (err error) {
106106
var userFlags []string
107107
var userPassword string
108108

@@ -129,7 +129,7 @@ func (s DefaultUserSyncStrategy) createPgUser(user spec.PgUser, db *sql.DB) (err
129129
return
130130
}
131131

132-
func (s DefaultUserSyncStrategy) alterPgUser(user spec.PgUser, db *sql.DB) (err error) {
132+
func (strategy DefaultUserSyncStrategy) alterPgUser(user spec.PgUser, db *sql.DB) (err error) {
133133
var resultStmt []string
134134

135135
if user.Password != "" || len(user.Flags) > 0 {
@@ -206,9 +206,9 @@ func quoteParameterValue(name, val string) string {
206206
// in the schema name would break the parsing code in the operator.)
207207
if start == '\'' && end == '\'' {
208208
return fmt.Sprintf("%s", val[1:len(val)-1])
209-
} else {
210-
return val
211209
}
210+
211+
return val
212212
}
213213
if (start == '"' && end == '"') || (start == '\'' && end == '\'') {
214214
return val

0 commit comments

Comments
 (0)